e:\Code\1_PCDownloader\PackageTools\product\win32\dbginfo\kpacket.pdb
Static task
static1
Behavioral task
behavioral1
Sample
efadf013c147a0b3bc4be1d84b0afc7a671e45b4a243c0bf133d6cbde3c5a09c.exe
Resource
win7-20231129-en
General
-
Target
efadf013c147a0b3bc4be1d84b0afc7a671e45b4a243c0bf133d6cbde3c5a09c
-
Size
1.1MB
-
MD5
4c62e61287e2358db4cd9c9724aee608
-
SHA1
0fe4a1bf64ca1fdc8c411005d4f0ab39eebc8d2a
-
SHA256
efadf013c147a0b3bc4be1d84b0afc7a671e45b4a243c0bf133d6cbde3c5a09c
-
SHA512
c602d8cfb7d19bd64425d10158f97aa84280b8d373327a8d83646cea241c739eceac1e452097cbaf386aa0248b94c0df7c2a3979e778212837affc0818510aa0
-
SSDEEP
24576:h/vXd0GFi/eytAEup7NPUHo88uIwHxIQ6Hn0a7kjxY3:Zfd0GFi/pAEM7NcJxIQ6HnNAF+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource efadf013c147a0b3bc4be1d84b0afc7a671e45b4a243c0bf133d6cbde3c5a09c
Files
-
efadf013c147a0b3bc4be1d84b0afc7a671e45b4a243c0bf133d6cbde3c5a09c.exe windows:4 windows x86 arch:x86
eba69ed4e0473d3f79d6c77fea6e22e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcessId
SizeofResource
LockResource
LoadResource
GetTempPathW
CreateFileW
FindResourceExW
GetCurrentProcess
GetFileSize
GetModuleHandleW
TerminateProcess
ExpandEnvironmentStringsW
FindFirstFileW
GetWindowsDirectoryW
lstrcmpW
SetFileAttributesW
GetCurrentDirectoryW
DeleteFileW
MoveFileExW
GetTickCount
GetFileAttributesW
CreateDirectoryW
FindNextFileW
GetLastError
FindClose
SetFilePointer
RemoveDirectoryW
ReadFile
MultiByteToWideChar
GetCommandLineW
WideCharToMultiByte
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
VirtualAlloc
DeleteCriticalSection
SetEvent
InitializeCriticalSection
ReleaseSemaphore
ResetEvent
CreateSemaphoreW
CreateEventW
GetStdHandle
WriteFile
CopyFileW
SetFileTime
MoveFileW
GetTempFileNameW
GetSystemInfo
SystemTimeToFileTime
LocalFileTimeToFileTime
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
CreateFileA
FindResourceW
GetProcAddress
LoadLibraryW
CloseHandle
CreateProcessW
GetSystemDirectoryW
WaitForSingleObject
GetModuleFileNameW
VirtualFree
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
HeapCreate
GetStringTypeW
RaiseException
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
InterlockedIncrement
InterlockedDecrement
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCurrentThreadId
CreateThread
GetStartupInfoW
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
ExitProcess
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
user32
UnregisterClassA
CharLowerW
CharUpperW
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
ole32
CoUninitialize
CoInitialize
oleaut32
SysFreeString
SysAllocString
VariantClear
VariantCopy
shlwapi
PathAddBackslashW
PathRemoveFileSpecW
PathIsDirectoryW
PathAppendW
PathFileExistsW
Sections
.text Size: 256KB - Virtual size: 253KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE